0% found this document useful (0 votes)
19 views18 pages

IT Tools Unit-9

The document discusses future skills related to cyber security including Internet of Things (IOT), cloud computing, big data, virtual reality, artificial intelligence, 3D printing, and robotic process automation. It then covers topics related to computer security including the need for cyber security, causes of cybercrime, and basic steps to secure personal computers and smartphones like setting passwords, installing antivirus software, and updating systems.

Uploaded by

Shubham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views18 pages

IT Tools Unit-9

The document discusses future skills related to cyber security including Internet of Things (IOT), cloud computing, big data, virtual reality, artificial intelligence, 3D printing, and robotic process automation. It then covers topics related to computer security including the need for cyber security, causes of cybercrime, and basic steps to secure personal computers and smartphones like setting passwords, installing antivirus software, and updating systems.

Uploaded by

Shubham
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Unit-9

Overview of Future skills and Cyber Security

presented by -Rakhi mathur


IOT
• Internet of Things (IOT) is the networking of physical objects that
contain electronics embedded within their architecture in order to
communicate and sense interactions amongst each other or with
respect to the external environment.

presented by -Rakhi mathur


There are four main components used in IoT:
• Low-power embedded systems –
Less battery consumption, high performance are the inverse factors play a
significant role during the design of electronic systems.
• Cloud computing –
Data collected through IoT devices is massive and this data has to be stored
on a reliable storage server. This is where cloud computing comes into play.
• Availability of big data –
We know that IoT relies heavily on sensors, especially real-time. As these
electronic devices spread throughout every field.
• Networking connection –
In order to communicate, internet connectivity is a must where each
physical object is represented by an IP address.
presented by -Rakhi mathur
Big Data
• Big data is a field that treats ways to analyze, systematically extract
information from, or otherwise deal with data sets that are too large
or complex to be dealt with by traditional data-processing application
software.

presented by -Rakhi mathur


Cloud Computing
• Cloud computing is the on-demand availability of computer system
resources, especially data storage (cloud storage)
and computing power, without direct active management by the user.
The term is generally used to describe data centers available to many
users over the Internet.

presented by -Rakhi mathur


Virtual Reality
• Virtual Reality (VR) is the use of computer technology to create a
simulated environment. Unlike traditional user interfaces, VR places
the user inside an experience. Instead of viewing a screen in front of
them, users are immersed and able to interact with 3D worlds

presented by -Rakhi mathur


Applications of virtual reality design
• Video games
• Education
• Car design

presented by -Rakhi mathur


Artificial Intelligence
• In computer science, artificial intelligence, sometimes called machine
intelligence, is intelligence demonstrated by machines, in contrast to
the natural intelligence displayed by humans and animals.

presented by -Rakhi mathur


Advantage
• Little/no risk.
• Safe, controlled area.
• Realistic scenarios.
• Can be done remotely saving time and money.
• Improves retention and recall.
• Simplifies complex problems/situations.
• Suitable for different learning styles.
• Innovative and enjoyable.

presented by -Rakhi mathur


Part-2

presented by -Rakhi mathur


3D printing
• 3D printing, or additive manufacturing, is the construction of a three-
dimensional object from a CAD model or a digital 3D model.
• 3D printing is a fundamentally different way of producing parts
compared to traditional subtractive (CNC machining) or formative
(Injection molding) manufacturing technologies.
• In 3D printing, no special tools are required (for example, a cutting
tool with certain geometry or a mold). Instead the part is
manufactured directly onto the built platform layer-by-layer, which
leads to a unique set of benefits and limitations.

presented by -Rakhi mathur


Robotic Process Automation
• Robotic process automation is a form of business process automation
technology based on metaphorical software robots or on artificial
intelligence /digital workers. It is sometimes referred to as software
robotics

presented by -Rakhi mathur


Computer Security
• Computer security, cyber security or information technology security
is the protection of computer systems and networks from the theft of
or damage to their hardware, software, or electronic data, as well as
from the disruption or misdirection of the services they provide.

presented by -Rakhi mathur


Need of Cyber Security

presented by -Rakhi mathur


Causes of Cybercrime
• Easy to access – The problem behind safeguarding a computer system
from unauthorized access is that there are many possibilities of
breach due to the complex technology.
• Capacity to store data in comparatively small space – The computer
has the unique characteristic of storing data in a very small space.
This makes it a lot easier for the people to steal data from any other
storage and use it for own profit.

presented by -Rakhi mathur


• Complex – The computers run on operating systems
and these operating systems are programmed of
millions of codes. The human mind is imperfect, so
they can do mistakes at any stage. The cybercriminals
take advantage of these gaps.
• Negligence – Negligence is one of the characteristics
of human conduct. So, there may be a possibility that
protecting the computer system we may make any
negligence which provides a cyber-criminal the access
and control over the computer system.
• Loss of evidence – The data related to the crime can
be easily destroyed. So, Loss of evidence has become a
very common & obvious problem which paralyzes the
system behind the investigation of cyber-crime.

presented by -Rakhi mathur


Securing PC
• 1. Keep up with system and software security updates
• 2. Have your wits about you
• 3. Enable a firewall
• 4. Adjust your browser settings
• 5. Install antivirus and anti spyware software
• 6. Password protect your software and lock your device
• 7. Encrypt your data
• 8. Use a VPN

presented by -Rakhi mathur


Securing Smart Phone: Basic protection
• Set a password
• Install Find My Device
• Stay updated
• Set up fingerprint unlock
• Prevent unknown downloads
• Uninstall apps
• Check app permissions

presented by -Rakhi mathur

You might also like